1 00:00:00,500 --> 00:00:06,720 We are now going to talk about operating systems in relation to security now an operating system or 2 00:00:06,810 --> 00:00:15,300 OS is system software that manages computer hardware and software resources and provides common services 3 00:00:15,590 --> 00:00:17,440 for computer applications. 4 00:00:17,460 --> 00:00:23,370 The operating system is the main software on a computer that controls all the applications. 5 00:00:23,370 --> 00:00:33,270 Examples of desktop operating systems include Windows 7 a 10 also Mac us Debian Linux a boon to Linux 6 00:00:33,330 --> 00:00:37,700 BSD salon resect cetera on the mobile phone. 7 00:00:37,840 --> 00:00:47,310 There are operating systems such as iOS for Apple Android Windows OSs BlackBerry OSS Symbian and so 8 00:00:47,310 --> 00:00:48,000 on. 9 00:00:48,090 --> 00:00:52,940 The operating system has full control of all actions on a device. 10 00:00:52,980 --> 00:01:00,090 If the operating system isn't secure or is compromised it is absolutely game over from the start for 11 00:01:00,090 --> 00:01:01,230 your security. 12 00:01:01,230 --> 00:01:07,300 The OS needs to be a secure base to hope to have a secure environment. 13 00:01:07,650 --> 00:01:12,930 There are a lot of misconceptions when it comes to operating systems and security. 14 00:01:12,960 --> 00:01:15,990 You may have heard for example that Macs can't get viruses. 15 00:01:15,990 --> 00:01:17,460 Not true. 16 00:01:17,460 --> 00:01:21,200 Lots of people also say that Windows is terrible when it comes to security. 17 00:01:21,210 --> 00:01:23,590 Not necessarily true either. 18 00:01:23,610 --> 00:01:28,830 Then you've got people in the Linux camp that think Linux is the greatest operating system for security 19 00:01:28,830 --> 00:01:29,710 without fault. 20 00:01:29,790 --> 00:01:34,190 Not true Linux like any operating system isn't perfect. 21 00:01:34,380 --> 00:01:41,700 So let's explore some of those beliefs based on facts and statistics over the next few lectures and 22 00:01:41,700 --> 00:01:47,340 see where we actually end up when it comes to the security of Common Operating Systems. 23 00:01:47,340 --> 00:01:54,180 First let's consider the security features available within operating systems and also available third 24 00:01:54,180 --> 00:01:57,590 party apps for those operating systems. 25 00:01:57,720 --> 00:02:01,640 So Windows Windows has got a bad track record. 26 00:02:01,650 --> 00:02:03,670 There's no doubt about that. 27 00:02:03,690 --> 00:02:10,110 It's had weak security design from the beginning but you have to give credit where credit is due. 28 00:02:10,140 --> 00:02:16,380 In the more recent operating systems Microsoft has started to take security seriously and with its later 29 00:02:16,380 --> 00:02:23,550 products and its later security features like bit lock the device guard windows halo windows trusted 30 00:02:23,640 --> 00:02:24,180 apps. 31 00:02:24,300 --> 00:02:27,870 It has a fairly solid set of security features. 32 00:02:27,870 --> 00:02:33,570 Now the thing that lets windows down especially with the more recent Windows 10 are the tracking and 33 00:02:33,570 --> 00:02:40,230 privacy issues which is a slightly different thing to security features but it does put some people 34 00:02:40,230 --> 00:02:41,010 off. 35 00:02:41,040 --> 00:02:46,590 We will be covering Windows security and privacy features and applications in much more detail as we 36 00:02:46,590 --> 00:02:47,810 go through the course. 37 00:02:47,820 --> 00:02:49,390 This is an overview. 38 00:02:49,400 --> 00:02:57,510 Next Marcos currently again like Windows has a reasonable solid base of security features things like 39 00:02:57,510 --> 00:03:04,410 address space layout randomisation application sandboxing Firebolt to privacy controls. 40 00:03:04,440 --> 00:03:09,050 Apple's trusted store apps and so on all strong security features. 41 00:03:09,150 --> 00:03:16,520 But if you were to compare Windows 10 to the latest Mac course Windows has more security features and 42 00:03:16,530 --> 00:03:22,830 much more third party security applications are available for Windows over Mac of sorts. 43 00:03:22,840 --> 00:03:28,410 I mean by that so for example if you're looking for a good application firewall for Mac us or another 44 00:03:28,470 --> 00:03:32,140 security product or feature you're going to get from a third party. 45 00:03:32,220 --> 00:03:34,410 You have limited choice. 46 00:03:34,410 --> 00:03:37,350 There just isn't much available for Windows. 47 00:03:37,350 --> 00:03:39,410 The choice is almost endless. 48 00:03:39,420 --> 00:03:44,580 We will be covering makkal security and privacy features and applications in more detail as we go through 49 00:03:44,580 --> 00:03:45,330 the course. 50 00:03:45,420 --> 00:03:52,590 Then we have Linux Linux type operating systems BSD type Unix like operating systems. 51 00:03:52,620 --> 00:03:58,830 There's a large variety of these operating systems so I'm bucketing them all together for convenience 52 00:03:58,830 --> 00:04:00,090 here for this lecture. 53 00:04:00,120 --> 00:04:04,930 If you're looking for the most secure operating systems this is where you're going to find them. 54 00:04:04,950 --> 00:04:13,500 The likes of cubes OS tale's Debian Arch Linux would be good examples of security and privacy focused 55 00:04:13,620 --> 00:04:20,070 operating systems and we will of course be covering cubes as tails and other Linux operating system 56 00:04:20,070 --> 00:04:24,740 security features and applications as we go through the course and just for your information if you're 57 00:04:24,750 --> 00:04:33,260 looking for beginner friendly Linux operating systems then consider Manjari you a bound to and mint. 58 00:04:33,480 --> 00:04:40,800 But Debian is my recommendation for a general use operating system that also consider security and privacy. 59 00:04:40,800 --> 00:04:47,220 If you're looking for a Linux operating system when we consider Windows Mac and Linux Windows has the 60 00:04:47,220 --> 00:04:54,300 most security features and third party security applications available Mac has the least security features 61 00:04:54,300 --> 00:05:00,470 and third party security applications available and Linux is where this security focused rating systems 62 00:05:00,470 --> 00:05:01,470 can be found. 63 00:05:01,520 --> 00:05:09,200 Windows Mac has a linux based on their security features can all be used as a secure base operating 64 00:05:09,200 --> 00:05:09,770 system. 65 00:05:09,920 --> 00:05:16,790 But if you need higher levels of protection you'll be looking towards Linux type operating systems on 66 00:05:16,790 --> 00:05:18,290 the mobile platform. 67 00:05:18,290 --> 00:05:24,200 The main competing operating systems are android from Google and also from Apple. 68 00:05:24,200 --> 00:05:30,110 Android is a more open operating system when you're allowed to do more with it and you can do more with 69 00:05:30,110 --> 00:05:33,780 it which is great but this isn't good for security there. 70 00:05:33,790 --> 00:05:37,490 IOS is a closed system restricting what you can do. 71 00:05:37,520 --> 00:05:42,890 You can do less on it than you can on Android but because it's a restricted operating system a close 72 00:05:42,890 --> 00:05:46,010 operating system this is good for security. 73 00:05:46,010 --> 00:05:52,390 Android is improving security all the time but iOS from Apple will be the market leader. 74 00:05:52,390 --> 00:05:56,370 If you're looking for a secure mobile operating system right now.